摘要 |
The invention provides a method for controlling access to a computerized entity, the method includes the stages of: (i) receiving a request from an entity; (ii) determining whether the request is legitimate; and (iii) generating a response to the request; whereas a response to a legitimate request comprises an encrypted access control information that is responsive to request associated characteristics and to a random value. The invention provides a system for controlling access to a computerized entity, the system includes: (i) the computerized entity; (ii) an intermediate entity, connected to the computerized entity, the intermediate entity is adapted to: (i) receive a request from an entity; determine whether the request is legitimate; and (ii) generate a response to the request; whereas a response to a legitimate request comprises an encrypted access control information that is responsive to request associated characteristics and to a random value.
|